QUESTION 67You are migrating a solution to Windows Azure.The solution includes a web application and a business logic layer.The web application runs on three dual-core servers.The business logic layer runs on two quad-core servers.The Windows Azure application must match or exceed the current hardware specifications. You need to recommend role instance sizes that minimize cost.What should you recommend?

A. Small for the web application and Medium for the business logic layerB. Small for the web application and Large for the business logic layerC. Medium for the web application and Large for the business logic layerD. Large for the web application and Extra Large for the business logic layer

QUESTION 68You are designing an automated deployment process for a Windows Azure application. The process must deploy the application to Windows Azure without any user interaction.You need to recommend a deployment strategy.What should you recommend?

A. Use the Service Management API to deploy the application package.B. Use the cspack and csrun command-line utilities and pass the cloud project as an argument.C. Publish the cloud project to a local directory and upload the application package to Windows Azure Blob storage.D. Publish the cloud project to a local directory and use the Windows Azure Developer Portal to upload the application.

Answer: A

QUESTION 69A Windows Azure application is running in the development fabric. You need to recommend an approach for deploying the application to Windows Azure.What should you recommend?

QUESTION 70You are modifying a web application so that it uses Azure Active Directory to manage users. You create a security group named Users and a security group named Administrators. The Administrators security group is a member of the Users security group.You create the following code segment. Line numbers are included for reference only.You need to implement the canAccessUserResources function.Which code segment should you insert at line 02?

A. Option AB. Option BC. Option CD. Option D

Answer: C

QUESTION 71Hotspot QuestionYour company works with trusted partners. These partners upload files into a storage account that you control.Partners must be able to create, read, and write files. Partners must NOT be allowed to see files from other partners. You generate a shared access signature (SAS) for each partner.You create the following Windows PowerShell script to create a new container for each partner. Line numbers are included for reference only.For each of the following statements, select Yes if the statement is true. Otherwise, select No.Answer:

QUESTION 72A company maintains an Azure storage account. The storage account uses blobs and tables.Customers access the storage account by using shared access signatures (SASs).You need to monitor the usage of the storage services. You need to do the following:Understand which storage areas perform operations that incur a fee. Understand which requests are denied because of insufficient permissions. Validate that the performance of the storage account meets the service level agreement (SLA) for the Azure Storage service.Which three data analysis tasks should you perform? Each correct answer presents part of the solution.

A. Use data from the logs of the storage services to find individual storage access attempts that do not comply with the SLA.B. Use data from the logs of the storage services to calculate aggregate server latency across individual requests. Determine whether the results of this calculation indicate that the Azure Storage service is in compliance with the SLA.C. Analyze the logs of the storage services to determine which storage services were inaccessible because of permissions issues.D. Review the Azure documentation to determine which storage operations are billable. Then find records of those operations in the logs of the storage services.E. Analyze the logs of the storage services to find records of operations that are marked as billable.F. Correlate the data logged from the storage service with the permissions to store data in the individual blobs and containers. Determine which storage services were inaccessible because of permissions issues.